- [Voiceover] Do you ever wonder how easy it might beto obtain a password and get into your system?Once in the system, what can malicious parties do?Could they escalate their privilegesto the administrator level?Hi, my name is Lisa Bock, and I'm a security ambassador.In this course, I'll explore the third phaseof ethical hacking, system hacking,an important phase for many reasons.After scanning target systems,the ethical hacker is then armed with more information,and has a better idea of how malicious partiesmight get deeper into a system.

Author

Released

7/20/2016

System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks. This course explains the main methods of system hacking—password cracking, privilege escalation, spyware installation, and keylogging—and the countermeasures IT security professionals can take to fight these attacks. Security expert Lisa Bock also covers steganography, spyware on a cell phone, and tactics for hiding files and tools.